首页> 外文期刊>Computers & Security >Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning
【24h】

Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning

机译:浏览器缓存中的人:通过浏览器缓存中毒持续进行HTTPS攻击

获取原文
获取原文并翻译 | 示例
       

摘要

In this paper, we present a systematic study of browser cache poisoning (BCP) attacks, wherein a network attacker performs a one-time Man-In-The-Middle (MITM) attack on a user's HTTPS session, and substitutes cached resources with malicious ones. We investigate the feasibility of such attacks on five mainstream desktop browsers and 16 popular mobile browsers. We find that browsers are highly inconsistent in their caching policies for loading resources over SSL connections with invalid certificates. In particular, the majority of desktop browsers (99% of the market share) and popular mobile browsers (over a billion user downloads) are affected by BCP attacks to a large extent. Existing solutions for safeguarding HTTPS sessions fail to provide comprehensive defense against this threat. We provide guidelines for users and browser vendors to defeat BCP attacks. Meanwhile, we propose defense techniques for website developers to mitigate an important subset of BCP attacks on existing browsers without cooperation of users and browser vendors. We have reported our findings to browser vendors and confirmed the vulnerabilities. For example, Google has acknowledged the vulnerability we reported in Chrome's HTML5 AppCache and has fixed the problem according to our suggestion.
机译:在本文中,我们对浏览器缓存中毒(BCP)攻击进行了系统的研究,其中网络攻击者对用户的HTTPS会话执行一次一次性的中间人(MITM)攻击,并将缓存的资源替换为恶意的那些。我们调查了在五种主流桌面浏览器和16种流行移动浏览器上进行此类攻击的可行性。我们发现浏览器的缓存策略与使用无效证书通过SSL连接加载资源的缓存策略高度不一致。特别是,大多数台式机浏览器(占市场份额的99%)和流行的移动浏览器(用户下载量超过10亿)在很大程度上受到BCP攻击的影响。现有的用于保护HTTPS会话的解决方案无法针对这种威胁提供全面的防御。我们为用户和浏览器供应商提供了防范BCP攻击的指南。同时,我们提出了针对网站开发者的防御技术,以缓解现有浏览器对BCP攻击的重要子集,而无需用户和浏览器供应商的合作。我们已将发现的结果报告给浏览器供应商,并确认了漏洞。例如,谷歌已经承认我们在Chrome的HTML5 AppCache中报告了该漏洞,并根据我们的建议解决了该问题。

著录项

  • 来源
    《Computers & Security》 |2015年第11期|62-80|共19页
  • 作者单位

    School of computing, National University of Singapore, 13 Computing Drive, COM1 #3-27, Singapore 117417;

    School of Electronic and Information Engineering, Beihang University, 37 Xueyuan Road, Haidian District, Beijing 100191, China;

    Advanced Digital Sciences Center, 1 Fusionopolis Way, #08-10 Connexis North Tower, Singapore 138632;

    School of computing, National University of Singapore, 13 Computing Drive, COM1 #3-27, Singapore 117417;

    School of Electronic and Information Engineering, Beihang University, 37 Xueyuan Road, Haidian District, Beijing 100191, China;

    School of computing, National University of Singapore, 13 Computing Drive, COM1 #3-27, Singapore 117417;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Browser cache poisoning; Web security; Browser vulnerability; HTTPS; Script injection;

    机译:浏览器缓存中毒;网络安全;浏览器漏洞;HTTPS;脚本注入;
  • 入库时间 2022-08-18 02:11:33

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号